News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Zero Trust: Advanced User Intelligence
B2B Cyber ​​Security ShortNews

A Zero Trust Data Security company presents its Advanced User Intelligence. The new functions support companies in proactively fending off cyber attacks. With the introduction of user intelligence, Rubrik creates cyber resilience for data and users for its customers. This allows organizations to take preemptive action to stop attacks before they cause significant damage. Data is vulnerable to cyber incidents and as attack methods evolve, the user has become a lucrative target for cybercriminals. According to Rubrik Zero Labs’ recent report, The State of Data Security,…

Read more

Cloud-native security
B2B Cyber ​​Security ShortNews

As cloud infrastructure becomes more important, securing it has become a key issue for government agencies. Therefore, implementing cloud-native security is a key focus. Vulnerabilities in cloud systems and environments expose government agencies to similarly serious threats given the potential uses and the volume and sensitivity of data, Palo Alto Networks reports. The ongoing cloud trend makes this area of ​​risk even more serious. Several factors have driven the accelerated migration to the cloud, including significant technological advances, the impact of COVID on the delivery of...

Read more

Security as a service
Security as a service

Companies around the world are increasingly using Security-as-a-Service (SECaaS) solutions, Zero Trust and AI. For 42 percent of respondents, “threat defense speed” is the main reason for using SECaaS, i.e. cloud models for outsourcing cybersecurity services. 18 percent say SECaaS helps them address an in-house talent shortage. "In an economy increasingly driven by apps and APIs, cybersecurity processes must operate at lightning speed to stay ahead of rapidly evolving attacks," said Lori MacVittie, F5 distinguished engineer and co-author of the SOAS report. Zero Trust and AI Speed ​​is also a…

Read more

Doing Zero Trust the right way
Doing Zero Trust the right way

To combat the new risks associated with the current hybrid way of working, many cyber security executives and vendors have now discovered “Zero Trust”: This framework aims to enforce security in the IT environment while at the same time increasing the productivity of the entire company increase. The way people work has changed dramatically in the last decade. Enterprise employees today work from anywhere, using devices and networks no longer directly under their control, to access corporate resources in the cloud….

Read more

Identity Security for Zero Trust
Identity Security for Zero Trust

While the majority of organizations understand the importance of identity security, only 9 percent are taking an agile, holistic, and mature approach to protecting identities in their hybrid and multi-cloud environments. That's according to a new study by CyberArk. This also provides a maturity model that helps security leaders assess their current strategies, uncover risks and strengthen cyber resilience. For the report, The Holistic Identity Security Maturity Model: Raising the Bar for Cyber ​​Resilience,1 CyberArk and the Enterprise Strategy Group (ESG) surveyed 1.500 security professionals worldwide, including…

Read more

Microsoft 365 is stalling old Exchange servers
Microsoft 365 is stalling old Exchange servers

Only recently, thousands of Exchange servers were attacked because they were not patched. This is how many infected emails got to Microsoft 365 and Exchange online. Microsoft is now checking these insecure linked servers, warning the administrators and pinching them off with a countdown of up to 90 days. According to Microsoft's new approach, there should be no more outdated and insecure Exchange servers in the future. The on-premises Exchange servers, which deliver to Exchange-Online and thus to Microsoft 365 via a connector, are now checked for their update status and security. Outdated servers threatened by…

Read more

Attacks on the supply chain
Attacks on the supply chain

Attackers have always looked for the weakest link in the chain in order to break through a defence. This has not changed in today's highly digitized business world and also includes the supply chain of the supplier industry. Suppliers often have access to their customers' internal systems, and a hack on seemingly insignificant suppliers can mean for hacker groups entry into the network of a global corporation. Attacks via the software supply chain are even more common and have even more dramatic effects. So instead of attacking the targeted company directly, cybercriminals target their software distributors…

Read more

Focus on identities
Focus on identities

A new approach to IT security focuses on identities. In recent years, more and more companies have switched to hybrid and decentralized work environments. With this shift, IT teams have learned that they can't trust the network like they used to. Employees now have direct access to their company's resources over the Internet, bypassing traditional security tools such as virtual private networks (VPNs) and firewalls. The shift isn’t just limited to the network—remote working has proven that anyone, anywhere, with anyone…

Read more

Report: Security and Compliance through Zero Trust
Report: Security and Compliance through Zero Trust

Modern businesses face a number of challenges. How can the Zero Trust approach lead to increased security and compliance? A new report from 451 Research SP Global Business makes the case for simplified management and zero trust applications. The economy is under increased pressure, supply chains are being delayed and the global geopolitical environment is characterized by uncertainty. To make matters worse, the digital landscape is a cyber security nightmare – exacerbated by increasing cyber threats, the new model of working from any location, and the shortage of cyber security experts. The…

Read more

Security solution with next-gen zero-trust network access
B2B Cyber ​​Security ShortNews

Keeper Security, provider of zero trust cyber security solutions, releases the latest update of its Keeper Connection Manager (KCM). This now enables DevOps and IT teams to access RDP, SSH, database and Kubernetes endpoints directly via web browsers. With this new functionality, companies can grant their administrators the exact access to databases and tables they need to perform their jobs. For temporary access, the Keeper Connection Manager offers a quick and easy solution - unlike installing client-side software. Easy access also via browser The administrators only have to…

Read more